ServiceRouteExA
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
7c4927948a741e8e8e2a7c16715ec9dd.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7c4927948a741e8e8e2a7c16715ec9dd.dll
Resource
win10v2004-20231215-en
Target
7c4927948a741e8e8e2a7c16715ec9dd
Size
16KB
MD5
7c4927948a741e8e8e2a7c16715ec9dd
SHA1
e9a6c2ba28d2656f62d8009e4be2b5554c83fb55
SHA256
df133b2a8513f7de95467e12aafc693264500586a2fa310b5a501f232307bd1a
SHA512
3f5461700213009e665c819a104af7d066dfc55b93d1cc13d7038a5f417d12fe2551a12c743ff35b143f599522da620857ee0f748f774854f4de20ce82fe9d32
SSDEEP
384:jhHX4rJM7UlNV1vzJuBBQARQkQIoJ44W:jh3Q51vzEBBQARQki
Checks for missing Authenticode signature.
resource |
---|
7c4927948a741e8e8e2a7c16715ec9dd |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_strupr
strlen
memcpy
memcmp
RtlZeroMemory
closesocket
gethostname
LoadLibraryA
GetSystemDirectoryA
GetPrivateProfileStringA
CreateThread
lstrlenA
WritePrivateProfileStringA
IsBadReadPtr
ExitProcess
lstrcpyA
lstrcmpiA
lstrcmpA
WaitForSingleObject
TerminateThread
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
lstrcatA
ReadFile
VirtualProtectEx
Sleep
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
ServiceRouteExA
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ